- The Certified Penetration Testing Consultant, C)PTC , course is designed for IT Security Professionals and IT Network Administrators who are interested in taking an in-depth look into specific penetration testing and techniques used against operating systems. This course will teach you the necessary skills to work with a penetration testing team, the exploitation process, and how to create a buffer overflow against programs running on Windows and Linux while subverting features such as DEP and ASLR.
Who should attend
IS Security Officers, Cybersecurity Managers/Administrators, Penetration Testers, Ethical Hackers, Auditors
Prerequisites
- Mile2 C)PEH and C)PTE or equivalent knowledge
- 2 years of experience in Networking Technologies
- Sound Knowledge of TCP/IP
- Computer Hardware Knowledge"
Course Objectives
Upon completion, the Certified Penetration Testing Consultant, C)PTC, candidate will have solid knowledge of testing and reporting proceedures which will prepare them for upper management roles within a cybersecurity system. They will be able to competently take the C)PTC exam.
Course Content
- Module 1 - Penetration Testing Team Formation
- Module 2- NMAP Automation
- Module 3 - Exploitation Process
- Module 4 - Fuzzing with Spike
- Module 5 - Simple Buffer Overflow
- Module 6 - Stack Based Windows Buffer Overflow
- Module 7 - Web Application Security and Exploitation
- Module 8 - Linux Stack Smashing & Scanning
- Module 9 - Linux Address Space Layout Randomization
- Module 10 - Windows Exploit Protection
- Module 11 - Getting Around SEH ASLR
- Module 12 - Penetration Testing Report Writing
- Lab 1 – Skills Assessment
- Lab 2 – Automation Breakdown
- Lab 3 – Fuzzing with Spike
- Lab 4 – Let’s Crash and Callback
- Lab 5 – MiniShare for the Win
- Lab 6 – Stack Overflow: Did we get root?
- Lab 7 – Defeat Me and Lookout ASLR
- Lab 8 – Time to Overwrite SHE and ASLR"
Comments
This course also prepares students for the exam : GERAPT, Red team OSCP and OSCE